Towards a structured unified process for software security
2006, Proceedings of the 2006 international workshop on Software engineering for secure systems - SESS '06
https://doi.org/10.1145/1137627.1137630Abstract
Security is often an afterthought when developing software, and is often bolted on late in development or even during deployment or maintenance, through activities such as penetration testing, add-on security software and penetrate-andpatch maintenance. We believe that security needs to be built in to the software from the beginning, and that security activities need to take place throughout the software lifecycle. Accomplishing this effectively and efficiently requires structured approach combining a detailed understanding on what causes vulnerabilities, and how specific activities combine to prevent them.
References (17)
- K. Beck. Embracing change with extreme programming. IEEE Computer, 32(10):70-77, 1999.
- K. Beck. Extreme Programming Explained: Embrace Change. Addison-Wesley, 1999.
- G. Hoglund and G. McGraw. Exploiting Software: How to Break Code. Addison-Wesley, 2004.
- M. Howard. Building more secure software with improved development processes. Security & Privacy Magazine, 2(6):63-65, Nov-Dec 2004.
- M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, 2003.
- I. Jacobson, G. Booch, and J. Rumbaugh. Unified Software Development Process. Addison-Wesley, 1999.
- J. Koziol, D. Litchfield, D. Aitel, C. Anley, S. Eren, N. Mehta, and R. Hassel. The Shellcoder's Handbook: Discovering and Exploiting Security Holes. Wiley, 2004.
- C. Landwehr, A. Bull, J. McDermott, and W. Choi. A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3):211-255, 1994.
- W. S. Lee, D. L. Grosh, F. A. Tillman, and C. H. Lie. Fault tree analysis, methods and applications -a review. IEEE Transactions on Reliability, R-34, August 1985.
- R. C. Linger. Cleanroom process model. IEEE Software, 11(2):50-56, March 1994.
- S. B. Lipner. The trustworthy computing security development lifecycle. In Proceedings of the 20th Annual Computer Security Applications Conference, pages 2-13. IEEE Computer Society, December 2004.
- G. McGraw. Software security. Security & Privacy Magazine, 2(2):80-83, Mar-Apr 2004.
- S. R. Palmer and J. M. Felsing. A Practical Guide to Feature-Driven Development. Prentice-Hall, 2002.
- S. T. Redwine and N. Davis. Task force for improving security across the development lifecycle task force report, Appendix B: Processes to produce secure software, 2004.
- SSE-CMM website. http://www.sse-cmm.org/ (accessed June 2005).
- J. Viega. The CLASP application security process, 2005. http://www.securesoftware.com/ (accessed June 2005).
- J. Viega and G. McGraw. Building Secure Software. Addison-Wesley, 2002.